Deploy a Laravel App to Heroku
Deploy a Laravel app with an encrypted .env.vault file to Heroku.
Find a complete code example on GitHub for this guide.
Initial setup
Install Laravel and create a new Laravel project.
composer create-project laravel/laravel yourapp
Add a Procfile
to run your Laravel app.
Procfile
web: heroku-php-apache2 public/
Edit resources/views/welcome.blade.php
.
resources/views/welcome.blade.php
Hello {{ env('HELLO') }}.
Create your project on Heroku.
heroku create
Generate a Laravel APP_KEY
and set it on Heroku.
php artisan key:generate --show
heroku config:set APP_KEY='base64:1234...'
Commit everything to code and push it to Heroku.
git push heroku
Once deployed, your app will say 'Hello .'
as it doesn't have a way to access the environment variable yet. Let's do that next.
Install dotenv-vault-laravel
Require dotenv-vault-laravel
in your composer.json
file.
composer require davidcochrum/dotenv-vault-laravel
composer.json
...
"require": {
"davidcochrum/dotenv-vault-laravel": "^1.1",
...
}
...
Add HELLO=World
to the bottom of your .env
file.
.env
...
HELLO="World"
Try running it locally.
php artisan serve
INFO Server running on [http://127.0.0.1:8000]
It should say Hello World
.
Great! ENV
now has the keys and values you defined in your .env
file. That covers local development. Let's solve for production next.
Build .env.vault
Push your latest .env
file changes and edit your production secrets. Learn more about syncing .env
files
npx dotenv-vault@latest new
npx dotenv-vault@latest push
npx dotenv-vault@latest open production
Use the compare environments feature to copy Laravel's development values to production. (Additionally, modify any production values as needed.)
Next, modify HELLO
to production
.
Then build your encrypted .env.vault
file.
npx dotenv-vault@latest build
Its contents should look something like this.
.env.vault
#/-------------------.env.vault---------------------/
#/ cloud-agnostic vaulting standard /
#/ [how it works](https://dotenv.org/env-vault) /
#/--------------------------------------------------/
# development
DOTENV_VAULT_DEVELOPMENT="/HqNgQWsf6Oh6XB9pI/CGkdgCe6d4/vWZHgP50RRoDTzkzPQk/xOaQs="
DOTENV_VAULT_DEVELOPMENT_VERSION=2
# production
DOTENV_VAULT_PRODUCTION="x26PuIKQ/xZ5eKrYomKngM+dO/9v1vxhwslE/zjHdg3l+H6q6PheB5GVDVIbZg=="
DOTENV_VAULT_PRODUCTION_VERSION=2
Set DOTENV_KEY
Fetch your production DOTENV_KEY
.
npx dotenv-vault@latest keys production
# outputs: dotenv://:[email protected]/vault/.env.vault?environment=production
Set DOTENV_KEY
on Heroku using the CLI.
heroku config:set DOTENV_KEY='dotenv://:key_1234…@dotenv.org/vault/.env.vault?environment=production'
Or use Heroku's UI.
Deploy
Commit those changes safely to code and deploy.
That's it! On deploy, your .env.vault
file will be decrypted and its production secrets injected as environment variables‚ just in time.
You'll know things worked correctly when you see Loading env from encrypted .env.vault
in your logs. If a DOTENV_KEY
is not set (for example when developing on your local machine) it will fall back to standard dotenv functionality.
You succesfully used the new .env.vault standard to encrypt and deploy your secrets. This is much safer than scattering your secrets across multiple third-party platforms and tools. Whenever you need to add or change a secret, just rebuild your .env.vault file and redeploy.